Menu

Monthly Archives: May 2009

I don’t do as much w/Digital Forensics as I would like, but I did come across this blog and wanted to share it w/folks:

The Windows Incident Response Blog, maintained by Harlan Carvey, is dedicated to the myriad information surrounding and inherent to the topics of incident response and computer forensic analysis of Windows systems. The blog also provides information in support of Carvey’s book, Windows Forensic Analysis, the second edition of which will be available in June, 2009.

Darknet is a group of like-minded individuals founded around 1999 sharing knowledge in password cracking, cracking, cryptography, programming, network security, Linux, Windows, UNIX and more.It started off on the EFNet IRC network back in the days when being a script kiddy was moderately cool, packet wars were in and lame DoS attacks like WinNUKE and the ath0++ modem drop were cool.

Put together by a band of IT ninjas, security professionals and hardcore gamers, Hak5 isn’t your typical tech show. They take on hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Then they wrap it all up with a healthy dose of cocktails and geek comedy. Damn the warranties, it’s time to Trust your Technolust.

Articles by hackers, for hackers. These guys are into finding ways of making technology work for them, and ultimately, us. Articles are open to the public, however downloads and forums are restricted to members only. There are some really good “How-tos” on this site.

This is available from The Linux Link site, but I wanted to specifically point this one out as it’s geared primarily for those new to Linux – “the very new Linux user,” that is. These podcasts start from the beginning, and to take it slowly. They help Windows and Mac users learn about the history of Linux, the importance of the principles of open-source software, and the Linux community. In addition, users are presented with the differences between various Linux distributions so folks can determine which is the right distribution with which to experiment.

MAKE brings the DIY mindset to all the technology in your life. MAKE is loaded with exciting projects that help you make the most of your technology at home and away from home. They celebrate your right to tweak, hack, and bend any technology to your own will.

PaulDotCom Security weekly’s mission is to provide free content within the subject matter of IT security news, vulnerabilities, hacking, and research. They strive to use new technologies to reach a wider audience across the globe to teach people how to grow, learn, and be security ninjas. The mixture of technical content and entertainment will continue to set a new standard for podcasting and Internet TV.

The ISC relies on an all-volunteer effort to detect problems, analyze the threat, and disseminate both technical as well as procedural information to the general public. Thousands of sensors that work with most firewalls, intrusion detection systems, home broadband devices, and nearly all operating systems are constantly collecting information about unwanted traffic arriving from the Internet. These devices feed the DShield database where human volunteers as well as machines pour through the data looking for abnormal trends and behavior. The resulting analysis is posted to the ISC’s main web page where it can be automatically retrieved by simple scripts or can be viewed in near real time by any Internet user.